Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 13:11
Static task
static1
Behavioral task
behavioral1
Sample
1a3f05975b97ceb60d0a14f6cb313c61_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1a3f05975b97ceb60d0a14f6cb313c61_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1a3f05975b97ceb60d0a14f6cb313c61_JaffaCakes118.exe
-
Size
29KB
-
MD5
1a3f05975b97ceb60d0a14f6cb313c61
-
SHA1
78b6d36b03c45b004732b94b13f7824dbc943ed1
-
SHA256
ff3a77fba4635a3bf17cfdb5ccd89a71c1c903ab09da7ab6753126b98759078c
-
SHA512
b49d55d28cf9884ba8da48a1a38c126669dcef2de03afd102e4dfa150f861a00bcf73c16448e15de02b467eaab94703047ffa42f40414478b4fed70c3f8c3bb8
-
SSDEEP
768:UZiiGTwSLxRm3Jxhwxv6kQumf6PdQHe6y:2iQFwxvhQxr2
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\30815380\ImagePath = "C:\\Windows\\system32\\D4952E40.EXE -a" 1a3f05975b97ceb60d0a14f6cb313c61_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2992 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1960 D4952E40.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\D4952E40.EXE 1a3f05975b97ceb60d0a14f6cb313c61_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\D4952E40.EXE 1a3f05975b97ceb60d0a14f6cb313c61_JaffaCakes118.exe File created C:\Windows\SysWOW64\D4952E40.EXE D4952E40.EXE File created C:\Windows\SysWOW64\35E15280.DLL D4952E40.EXE File created C:\Windows\SysWOW64\delme.bat 1a3f05975b97ceb60d0a14f6cb313c61_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1872 1a3f05975b97ceb60d0a14f6cb313c61_JaffaCakes118.exe 1960 D4952E40.EXE 1960 D4952E40.EXE 1960 D4952E40.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2992 1872 1a3f05975b97ceb60d0a14f6cb313c61_JaffaCakes118.exe 30 PID 1872 wrote to memory of 2992 1872 1a3f05975b97ceb60d0a14f6cb313c61_JaffaCakes118.exe 30 PID 1872 wrote to memory of 2992 1872 1a3f05975b97ceb60d0a14f6cb313c61_JaffaCakes118.exe 30 PID 1872 wrote to memory of 2992 1872 1a3f05975b97ceb60d0a14f6cb313c61_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a3f05975b97ceb60d0a14f6cb313c61_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1a3f05975b97ceb60d0a14f6cb313c61_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\delme.bat2⤵
- Deletes itself
PID:2992
-
-
C:\Windows\SysWOW64\D4952E40.EXEC:\Windows\SysWOW64\D4952E40.EXE -a1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD51a3f05975b97ceb60d0a14f6cb313c61
SHA178b6d36b03c45b004732b94b13f7824dbc943ed1
SHA256ff3a77fba4635a3bf17cfdb5ccd89a71c1c903ab09da7ab6753126b98759078c
SHA512b49d55d28cf9884ba8da48a1a38c126669dcef2de03afd102e4dfa150f861a00bcf73c16448e15de02b467eaab94703047ffa42f40414478b4fed70c3f8c3bb8
-
Filesize
233B
MD5c269831eba2daafa058f36e4fc9c90db
SHA17ecff961aa4cb3d8b870c1281c3e50b4a7e39272
SHA2560efd70e39b724185745a50ed5348ddd0cf3ff70944a2d3411610e47c6a5aa4f3
SHA512b16224b857821cebeaa9f41d61df60404c88a064a23e016da5a87cddaa759130382a25be69be29b392c6fce95e523e9f583763941755e7a16e45765a080b6cf3